Microsoft in the Cloud David Johnson, Moderator Jason Lambert, Microsoft Cloud Specialist May 31, 2016
MOBILE FIRST, CLOUD FIRST
Microsoft transformation Mobile-first Data-driven Cloud-first
1. Includes Word, Excel, PowerPoint, Outlook, OneNote, Publisher 2. Adds Access, Group Policy, Telemetry, Shared Computer Activation (RDS), Push Deployment, Update Controls, IRM, DLP, BI, Enterprise Voice, Site Mailboxes, Archiving & Retention 3. Only available via Advisor model
Business anywhere Business Anywhere with Enterprise Mobility Suite (EMS)
THE REVOLUTION CYBER-CRIME CYBER-ESPIONAGE CYBER-WARFARE CYBER-TERROR
Target - exploiting weak identities “The Target hackers broke into the network using a stolen user name and password that had been created for the company (a mid-sized business) servicing some of their air conditioning systems.” BRAIN KREBS (SECURITY BLOGGER) The Target credit card breach resulted in millions of credit cards appearing in the marketplace Source: “Cards Stolen in Target Breach Flood Underground Markets,” KrebsOnSecurity.com, December 20, 2013
The time to address enterprise mobility is now 29% of today’s global workforce use 3+ 80%+ employees admit to using non-approved devices, work from multiple locations and software-as-a-service (SaaS) applications in use many apps. their jobs 67% of people who use a smartphone for Data leakage resulting from device loss or work and 70% of people who use a tablet for theft is a top smartphone security risk – European work choose the devices themselves Union Agency for Network and Information Security
Enterprise Mobility Suite Behavior havior based ed Identity ity & Access ss Mobile Devic ice e & Information rmation threat eat anal alyti ytics cs App Ma Manag agement ement Prot otecti ection on Manag agemen ement Microsoft Azure Microsoft Azure Advanced Threat Active Directory Microsoft Intune Rights Management Analytics Premium Premium Easily manage identities Manage and protect Encryption, identity, and Identify suspicious activities across on-premises and corporate apps and data on authorization to secure corporate and advanced threats in near cloud. Single sign-on & self- almost any device with MDM files and email across phones, real time, with simple, service for any application & MAM tablets, and PCs actionable reporting
Microsoft Azure Microsoft Azure – IaaS, PaaS, and Cloud Storage
Trustworthy foundation BUILT ON MICROSOFT EXPERIENCE AND INNOVATION Trustworthy Microsoft 1 st Computing Azure Microsoft Initiative 100+ Data FedRAMP/ Data UK G-Cloud Centers Malware FISMA Assume Center Level 2 Protection Breach Operations Active Center SOC 2 Security Directory Assurance SOC 1 CSA Cloud E.U. Data Windows Security Controls Matrix Update Protection Development Digital ISO/IEC Directive Global Lifecycle HIPAA/ Microsoft Security Crimes 27001:2005 PCI DSS Data Center HITECH Response Center Unit Level 1 Services Microsoft Azure
Trustworthy foundation Dublin Chicago Amsterdam Beijing* Quincy Boydton Japan Shanghai* Cheyenne Des Moines Hong Kong San Antonio Singapore Brazil Australia Microsoft Azure *operated by 21Vianet
Trustworthy foundation Proactive m alware disruption Feeds enable Azure AD reports on logins from compromised devices IP crimes , including piracy Protecting consumers , emphasizing vulnerable populations (children, disabled and the elderly) Microsoft Azure
Shared responsibility REDUCES SECURITY COSTS + MAINTAINS FLEXIBILITY, ACCESS, & CONTROL On-Premises IaaS PaaS SaaS Customer Microsoft Microsoft Azure
Azure Key Benefits Host apps on Azure to deploy quickly and pay only for resources Increase Adapt you use your sales to change Microsoft Azure offers a Scale Get the applications range of key benefits Understand most out up or down your of your as needed that help enable the customer technology ModernBiz modern business Back up your files Be prepared Get your work done for the and data to the unexpected anywhere cloud, simply and affordably Protect Work Access Minimize downtime with and control together cloud – hosted affordable cloud-based your data easily applications from disaster recovery anywhere Microsoft Azure
The cloud: extending your IT infrastructure The cloud is ideal when The cloud is you need to: about instantly • Get apps up and running fast expanding your • Scale instantly IT capabilities • Pay only for what you use • Leverage enterprise-level security With Microsoft, you choose the combination that’s right for your business Physical Server Virtualization Cloud Microsoft Azure
Data protection Encryption for Securing Data data in transit data at rest segregation Industry standard Customers can Logical isolation and SSL/TLS protocols are implement a range of access controls are used for encrypting encryption options for employed data in transit virtual machines and storage Microsoft Azure
Simplified compliance Government Industry Information certifications certifications security standards ISO 27001 US FedRAMP/FISMA PCI DSS Level 1 SOC 1 Type 2 US CJIS HIPAA/HITECH SOC 2 Type 2 UK G-Cloud Life Sciences GxP Australia IRAP Singapore MCTS Microsoft Azure
Trusted by leading companies Microsoft Azure 22
“Everything we do in the world going forward is about ubiquitous computing and ambient intelligence. IT is an amazing opportunity.” Satya Nadella
Any questions?
Recommend
More recommend